A Multi-Agent Architecture for Electronic Payment

Size: px
Start display at page:

Download "A Multi-Agent Architecture for Electronic Payment"

Transcription

1 A Multi-Agent Architecture for Electronic Payment Sheng-Uei Guan and Feng Hua Department of Electrical & Computer Engineering National University of Singapore 10 Kent Ridge Crescent, Singapore ABSTRACT The Internet has brought about innumerable changes to the way enterprises do business. An essential problem to be solved before the widespread commercial use of the Internet is to provide a trustworthy solution for electronic payment. We propose a multi-agent mediated electronic payment architecture in this paper. It is aimed at providing an agent-based approach to accommodate multiple e-payment schemes. Through a layered design of the payment structure and a well-defined uniform payment interface, the architecture shows good scalability. When a new e-payment scheme or implementation is available, it can be plugged into the framework easily. In addition, we construct a framework allowing multiple agents to work cooperatively to realize automation of electronic payment. A prototype has been built to illustrate the functionality of this design. Finally we discuss the security issues. Keywords: Electronic payment, Mobile agent, Electronic commerce, Cryptography 1. INTRODUCTION 1.1 EXISTING PROBLEMS IN E-COMMERCE The exponential development of the Internet has changed the way enterprises do business. Electronic commerce is becoming an attractive means for conducting business transactions. However, the progress of e-commerce seems to be hindered by the lack of a widely accepted payment standard suitable for e-commerce. Meanwhile, another factor stymieing electronic commerce is also emerging to the surface. That is lack of intelligence. The vast size of information on the Internet also means that it is difficult for potential customers to locate products that they are interested 1

2 in. Therefore, e-commerce demands advanced technologies as support. Agent technology seems to be an excellent candidate with its properties of intelligence, autonomy, and mobility. Agent based e-commerce has emerged and become the focus of the next generation of e-commerce [18]. In this new approach, software agents act on behalf of customers to carry out delegated tasks automatically. They support a natural merging of object orientation and knowledge based technology to facilitate reasoning and learning. 1.2 MOTIVATION Electronic commerce is growing at a tremendous pace, generating a market need for payments of all types. Currently, there are multiple payment schemes like credit card based systems (SET protocol [12]), electronic cash (DigiCash [4]), or electronic checks available for a user. The diversity of payment mechanisms is beneficial since it will create a broader spectrum for exploration of solutions. The needs for diverse payment mechanisms could also be driven by user needs. For example, people pay by cash, check or credit card. Online buyers may also choose their preferred payment methods to complete transactions under different circumstances. Therefore, a system allowing buyers to use different payment methods rather than a single one will give the buyers more flexibility. A lot of research has been carried out to study how to automate the purchase process. For instance, research on how to automate the process of finding goods on the web and negotiating better prices has been studied widely [6, 13]. Most research work leverages on agent technology because automation needs intelligence. Agent technology is a candidate for solutions. 2

3 Payment is the last stage of the whole e-commerce process. Without automating payment, the whole process is not automated. In case of multiple payment options available for buyers to complete a transaction, intelligence is needed to choose the best payment option. For instance, to a particular buyer, usually credit card is preferred over e-cash for transactions. But if a merchant offers discount for e-cash payment, intelligence is needed to choose e-cash as the payment method. In another example, if the buyer has two credit card accounts and one of them has exceeded the limit, intelligence is needed to choose the appropriate credit card account. Therefore an automated payment system needs intelligence and agent technology can offer a solution. An agent system may consist of a single or multiple agents. In a multi-agent system, distributed control and cooperation among multiple agents will simplify each agent s modular function, speed up a system s operation. Moreover, multi-agent systems present more fault tolerance, since responsibilities are shared among agents. We propose a multi-agent architecture for electronic payment in this paper. The objective is to accommodate existing multiple payment methods and future payment methods under a scalable architecture. Another objective is to provide a framework allowing multiple agents to work cooperatively to automate the payment process. This paper is organized as follows: section 2 covers related research background. Section 3 introduces our multi-agent architecture for e-payment. The overall architecture and the interaction protocol among different entities in the framework are elaborated in details. Section 4 discusses and evaluates our prototype. Section 5 compares our work to related e-payment work. In the end, we conclude this paper and look into future work. 3

4 2. BACKGROUND 2.1 BRIEF REVIEW OF CURRENT E-PAYPENT SCHEMES In general, an e-payment system must exhibit integrity, authorization, confidentiality, and anonymity for security requirements [1]. Additionally, there are some other important characteristics such as interoperability, scalability, etc. Specific systems are designed to meet specific requirements, and how these characteristics are balanced poses a challenge to future development. Payment systems can be classified in a variety of ways according to their characteristics such as the exchange model (cash-like, check-like or hybrid), central authority contact (online or offline), or hardware requirements (specific or general, etc. For example, based on their exchange model, E- payment systems can be divided into categories as shown in Figure 1. Cash-like Systems Electronic Cash (Notes, Coins) Electronic Payment Systems Check-like Systems Credit-Card Based Systems With Cryptography Without Cryptography Debit Cards Credit-Debit Based Systems Electronic Checks Hybird Systems Stored-value Card Based Systems Figure 1. Classification of Electronic Payment Systems Based on the Exchange Model The architecture proposed in this paper is built on top of current payment schemes. We give a brief introduction of two typical payment schemes that are adopted as the underlying payment mechanisms in our architecture. 4

5 Secure Electronic Transaction (SET) Currently, a common e-payment method involves a client transmitting to a merchant detailed information of his payment card such as a VISA credit card. This system is simple but susceptible to frauds from either transacting party. The Secure Electronic Transaction (SET) protocol is an evolution of the existing credit-card based payment systems [12]. It provides enhanced security for information transfer as well as authentication of transaction participant identities by registration and certification. It has the potential to become a de facto international standard. Digital Cash (E-Cash) Participants of electronic currency payment systems include payers (buyers), merchants, and financial institutions. Digital cash uses electronic token (mostly a unique coded string) to represent monetary value. The bank issuing the tokens has a record of all the tokens. The acquiring bank of the merchants that receive the tokens will transfer them to a clearing house to process them. When the tokens are verified by the issuing bank, the real transaction of funds will take place and the tokens cannot be used again. The usage of digital cash enables full anonymity that cannot be found in other payment systems. Published schemes include E-Cash [2], NetCash, and CAFÉ [10], etc RELATED SAFER FRAMEWORK The proposed e-payment architecture is built in the SAFER context, proposed in earlier research work [5, 18, 22, 23]. We will only give a brief introduction to SAFER. SAFER: Secure Agent Fabrication, Evolution and Roaming, is an infrastructure designed to serve agents in e-commerce and establish necessary mechanisms to manipulate them. 5

6 We consider the concept of a mobile agent community which is a basic unit in SAFER. Figure 2 briefly sketches such a SAFER agent community. Figure 2. SAFER Agent Communities As shown in Figure 2, each SAFER community comprises various components and entities. Detailed information of SAFER can be found in [18]. For the clarity of later sections, we briefly introduce several entities involved in our architecture. They are the owner, Agent Butler, Clearing House & Bank and Trusted Third Party (TTP). The owner doesn t need to be online all the time, but assigns tasks and makes requests to agents via his Agent Butler. Depending on the authorization given, Agent Butler can make decisions on behalf of the owner during his absence, and manage various agents. Clearing House & Bank, as financial institutions in a SAFER community link all value-representations to real money. TTP is a SAFER certified trusted host in a community. Detailed roles of these entities will be discussed in section 3. 6

7 Besides those components, mobile agents are the basic units in the framework as well. And in SAFER, it is desirable for agents to have roaming capability. Roaming extends the agent s capability well beyond the limitations imposed by its owner s computer. Mobile agents should be able to physically leave their owners machines and perform their operations using the computing resources on hosting machines. Details of a mobile agent transport protocol definition can be found in [16]. The payment architecture is considered as an integral part of SAFER hosting and organizing multiple agents to realize automation of electronic transactions. 3. DESIGN OF THE MULTI-AGENT ELECTRONIC PAYMENT ARCHITETURE 3.1 OVERALL NETWORK ARCHITECTURE In this section, we present the overall network picture of the payment architecture, which contains necessary SAFER components involved in an e-payment transaction. As shown in Figure 3, there are five major entities in a typical electronic payment transaction. They are Interconnected Financial Institutions, Trusted Third Party, Payment Gateway, Online Shopping Server (Merchant Host), and Agent Butler (owner). These entities as network nodes construct an architecture in which a realization of electronic payment transaction may happen. Online Shopping Server represents an online e-commerce host, willing to receive and run agents on its local machine. It possesses product information in a local database for agents to access and extract data. Moreover, Merchant Host interacts with Agent Butler and provides related services in case of e-payment transactions. 7

8 Financial Institutions consist of bank servers and clearing houses. As depicted in Figure 3, the Issuer refers to the bank that establishes an account for the owner and issues the payment card or electronic checks to the account. The Issuer guarantees payment for authorized transactions using the payment card in accordance with payment card regulations. The Acquirer is the bank that establishes an account with Merchant Host and processes payment cards or validates authorizations and transactions. Payment is implemented by a payer paying the payee via the Issuer and Acquirer [1]. E-Cash server refers to the bank sever that handles issuing and verification of electronic currency. Interconnected Financial Institutions Trusted Third Party Acquirer Verification/ Transaction Clearing House Issuer Clearing E-Cash Sever Bank Registration Certificate Authority Check Cardholder Account/ Request Payment Payment Gateway Merchant Registration/ Require Certificate CardHolder Registration/ Require Certificate Payment Authorization/Capture E-Cash Deposit E-Cash Withdraw Shopping/Purchase/ Dispatching Agents Online Shopping Server (Merchant Host) Agent Butler (Owner) Figure 3. Overall Network Architecture In case that an inter-bank transaction could happen, or different payment forms issued by various banks are adopted by involved hosts, a clearing house will be needed to enable banks to exchange those different e-payment forms with one another and to transfer credits among different SAFER communities. The Clearing House shown in this 8

9 figure plays this role in the architecture, which facilitates inter-bank transactions especially with large amount of money. Another role is that the Clearing House will be needed to enable credit transactions between banks in SAFER communities and Non- SAFER communities. Since the focus of our work is on consumer-to-business transactions instead of business-to-business transactions, therefore we won t elaborate the Clearing House in further details in this paper. Payment Gateway (PG) is viewed as the front end of Financial Institution. For example, in a credit-card based system, it works as a device operated by the Acquirer that processes merchant payment messages, including payment instructions from cardholders. Trusted Third Parties, refer to some neutral SAFER certified trusted hosts in a community. In this paper, the one related to our payment architecture is Certificate Authority (CA). In order to facilitate the provision of security services such as privacy (secure key exchange), non-repudiation (digital signature) and identification, a PKI-based certification module will be used to establish identities for all SAFER entities. Therefore, SAFER entities will be able to identify and authenticate each other in a distributed environment. CA is such a provider of trusted digital certificates for each entity. Agent Butler resides in a local environment as a static user agent and has a number of functions pertaining to agent management. Agent Butler can dispatch mobile agents to remote hosts. It is responsible for keeping track of agent activities and locations by sending and receiving messages with them. Agent Butler carries out electronic transactions through its Financing Agency (elaborated in the following). In addition, Agent Butler maintains a user interface for interactions with its owner. 9

10 3.2 MULTI-AGENT ARCHITECTURE In Figure 3, we present the whole network architecture. In this section, we will zoom out and focus on the client based multi-agent structure. Under this structure, we use federated multi-agents to accomplish a complex task. This approach suggests that agents should be organized in a hierarchical structure. In a multi-agent e-commerce environment, it is necessary to organize agents into different categories according to their functionalities and competences. In the architecture, we use agency as a subsystem in which a collection of cooperative intelligent agents with specific expertise reside, waiting for tasks from Agent Butler or agency managers. An agency can be regarded as a multi-layered agent group or a federation of agents with specific goal and functional role in the architecture [9]. In other words, it is related to the category of agent classification and organization. Agencies are under the control of Agent Butler, who helps the owner to keep this virtual environment in order. Under this master-slave design pattern, agents are well organized. Meanwhile, the heavy load and responsibility of Agent Butler is relieved by these well-defined agencies. Therefore, in our architecture, distributed automation and central management are balanced. These agencies interact with each other under the facilitation of Agent Butler and provide services such as information collection, negotiation, decision-making, payment transaction and database maintenance, etc. The agency organization and workflow is depicted in Figure 4. There are Information Agency, Strategy Agency, Negotiation Agency and Financing Agency. 10

11 Information Agency Information agents 1. Authentication 2. Access merchant database 3. Gather information & report Owner UI Agent Butler (Owner) Local Database Strategy Agency Strategy agents 1. Information integration 2. Comparison & processing 3. Decision making & report Negotiation Agency Negotiation agents 1. Set price 2. Negotiate & counter offer 3. Place order Financing Agency Payment agent, Accountant agent, Auditing agent 1. Payment transactions 2. Account management 3. Auditing Merchant Host (Receptionist agent) Merchant Host Database Figure 4. Multi-Agent Architecture Among these agencies, Financing Agency is the focus in our payment architecture, because only the agents in this agency are involved in payment-related functions. When a purchase decision is made, Agent Butler will activate Financing Agency to initiate a purchase request, and conduct payment in stages via software agents within Financing Agency. More detailed information of Financing Agency and how the agents within this agency collaborate to conduct automated payment transactions will be elaborated in the following sections. 3.3 LAYERED PAYMENT STRUCTURE In this section, we focus on the hierarchical structure of Financing Agency - a layered payment structure as shown in Figure 5. The payment structure is divided into three layers. They are service layer, interaction layer and payment mechanism layer. This layered design decomposes a complex task into subtasks in which each group of subtasks is aligned to a particular level of abstraction. 11

12 The service layer defines a logical layer for different types of services available for the owner, for instance, finance service, information service, etc. Each service is provided by a particular agency. Agency defines the logical mapping for a particular service. If the owner wants a particular service, it can interact with the particular agency. The interaction layer contains entities that represent the agency to interact with the owner or Agent Butler. Normally these entities are specific agency managers, which control agent service groups (ASGs). A manager is assigned with a specific task by either the owner or Agent Butler, and then it dispatches the task to one of its agents in the ASG it controls. For instance, in order to perform an e-payment transaction, Agent Butler needs to interact with Payment Manager in Financing Agency. Then Payment Manager delegates the e-payment task to one of the payment agents in the payment mechanism layer, referring to some payment scheme. Another example is if the owner needs to register a credit card with Certificate Authority, he interacts with Account Manager in the same agency. Account Manager will then delegate the registration task to the SETRegister agent in the payment mechanism layer. Therefore the owner or Agent Butler does not need to know which agent he is interacting with. 12

13 Owner (Agent Butler) SERVICE LAYER requests Other Agencies Financing Agency Provide User Interface INTERACTION LAYER Payment Manager Account Manager Auditing Manager PAYMENT MECHANISM LAYER SET Payment Agent E-Cash Payment Agent SET Register Agent E-Wallet Manager Payment Reporter Agent Service Groups Figure 5. Financing Agency in the Layered Payment Structure The lowest layer is the payment mechanism layer. It contains agents to perform tasks, for instance, payment via the SET protocol or electronic currency management. In this layer we have Agent Service Groups (ASGs). Each ASG defines a group of agents that perform similar tasks via different ways. For instance, payment ASG defines a group of agents that are able to conduct e-payment transactions via different protocols, allowing Payment Manager in the interaction layer to manage them easily. This layered design allows various e-payment schemes to be accommodated into the payment architecture easily, because adding or removing a particular payment agent object in the payment mechanism layer is transparent to the owner or Agent Butler. By defining a uniform interface, agents that implement different payment schemes can be activated by agency managers in the same way. 13

14 3.4 ENTITY INTERACTIONS IN SET-BASED E-PAYMENT By now, we have discussed entities in the architecture and the layered payment structure. In this section, we present how these entities interact with each other to complete an e-payment process using typical payment schemes. We use the SET protocol [12] for credit card based payment as an example to illustrate this process (Figure 6). In the above entity interaction diagram, we assume a purchase decision has been made, and we proceed now with e-payment. There are two phases during a payment transaction as shown in Figure 6 and particular steps are marked in sequence. 1. Agent Butler receives a purchase decision report from Strategy Agency based on the data collected by mobile information agents. 2. According to pre-defined rules or authorization given by the owner, Agent Butler needs to decide if it should proceed with the payment or it needs to ask for approval or final decision from its owner. This may depend on the authorization given, the amount involved in the payment transaction or some other factors. 3. Once Agent Butler decides to proceed, it delegates the payment task to Payment Manager residing in Financing Agency. 4. Payment Manager invokes an available payment agent through a uniform interface - PaymentAgent (elaborated in section 4) and delegates the payment task to the agent that is able to handle a particular payment method. 14

15 2 Agent Butler Owner Uniform Payment Interface: PaymentAgent Payment Manager 4 SETPayment Agent 3 Financing Agency Other Managers 1 Other Agencies Phase 1 5.PInitReq Merchant Host Payment Gateway 6.PInitRes 7.PaymenReq 8.AuthReq Financial Network 10.PaymentRes 9.AuthRes Phase 2 Figure 6. Entity Interaction Diagram for SET Based E-Payment In step 4, since this e-payment transaction can be settled via different payment methods, e.g. credit card, electronic cash, etc., hence Payment Manager needs to decide which payment method to be used to complete this transaction. This is where intelligence is needed by Payment Manager, which is an agent as well. The decision can be made by Payment Manager, following certain rules set by the owner. These rules can be based on the transaction and payment method information, for instance, the amount to be paid or possible discount if paid by a particular brand of credit card. Based on the information received, Payment Manager chooses a payment method to complete the payment process, and then assigns the task to a related payment agent. In the above entity interaction 15

16 diagram, we assume credit card payment method is chosen by Payment Manager to complete the payment process, therefore the payment task is delegated to SETPayment Agent which can complete a payment transaction following the SET protocol. And we assume that the SET registration process with Certificate Authority has been done and each entity is issued a set of certificates before a purchase request is made. During steps 5 to 10 in phase two, SETPayment Agent firstly sends a payment initialization request to Merchant Host. The two parties authenticate each other's identity by exchanging their SET certificates and then SETPayment Agent transmits the encrypted order and payment information to Merchant Host. Merchant Host uses the payment information obtained from SETPayment Agent to make a payment authorization request to Payment Gateway. If these payment instructions are approved, a token is sent to Merchant Host who can make a payment capture request to Payment Gateway using this token later. This would initiate the entire sequence of financial processing at the end of which the actual funds will be deposited into the merchant's account. 3.5 ENTITY INTERACTIONS IN E-CASH PAYMENT In this section, we use another example of e-cash to show how the architecture accommodates different payment mechanisms. The entity interactions in an e-cash payment process are depicted in Figure 7 and particular steps are marked in sequence. In phase one, steps from 1 to 4 are similar to what we have discussed in section 3.4. The only difference is that in step 4, Payment Manager assigns the payment task to ECashPayment Agent that can complete a payment transaction following the electronic currency mechanism. Before a payment transaction may happen, there must be enough e- coins stored in the wallet. Otherwise, E-Wallet Manager needs to generate new coins 16

17 with desired value, and contact the E-Cash bank server, requesting for signing these unauthorized e-coins. Owner 2 3 Agent Butler 1 Uniform Payment Agent Interface Payment Manager Financing Agency Account Manager 4 Other Agencies ECashPayment Agent 7 E-Wallet Manager Phase 1 New coins statement Withdraw coins 5, Merchant Host 9. Validate/ Deposit coins 10. Valid Indication E-Cash Bank Server Phase 2 Figure 7. Entity Interaction Diagram for an E-Cash Payment Transaction 5. Having received a payment task, ECashPayment Agent sends a payment initialization message to Merchant Host. 6. Merchant Host sends a payment confirmation message to the client s payment agent. This message contains details about the order amount, the currency to be used, time stamp, and the merchant s bank account ID. 7. After ECashPayment Agent verifies the order information, it checks with E- Wallet Manager and requests for the very amount of e-coins. 17

18 8. ECashPayment Agent sends to Merchant Host these e-coins which are encrypted with the bank server s public key. 9. Merchant Host forwards the coins to the bank for validation and deposit. 10. The bank checks these coins are valid and haven not been used before. It sends a valid indication to Merchant Host and deposits the coins into his account. 11. Having received a valid payment, Merchant Host sends purchased items and a receipt to ECashPayment Agent, completing this payment transaction process. 3.6 DISCUSSIONS In the previous two sections, we have discussed the payment transaction processes using SET and electronic currency as the underlying payment mechanisms. However, a complete e-payment process does not only mean paying money to the merchant, it also includes account management and payment transaction auditing. For each payment protocol, we need a corresponding mechanism to maintain a specific account and keep transaction records in a particular format. For instance, when using the SET protocol, we need to register with Certificate Authority and keep an account which stores sensitive information and maintains personal certificates. When using electronic currency, we also need to maintain an account with the e-cash bank server and manage a local electronic wallet which is used to generate or store e-cash. Therefore, as shown in Figure 5, the interaction layer also includes Account Manager which controls its accounting ASG and delegates tasks to specific account-managing agents. Likewise, there is an auditing mechanism to provide support for recording and maintaining transaction history in case of possible dispute with merchants and financial institutions or enquiry from the owner. 18

19 Auditing Manager plays such a role in the architecture by controlling its auditing ASG that may include recording agent or reporter agent. The tradeoff of this layered design is that efficiency can be sacrificed to some extent, because task invocation is indirect. However the overhead is not significant. The correctness of e-payment is more important and it relies not on task invocation but on payment logic. Besides, efficiency is not among the major concerns but security issues are, which will be elaborated in section IMPLEMENTATION 4.1 SYSTEM OVERVIEW The prototype is implemented using the Java programming language. The reason for choosing Java is that Java is an object-oriented and platform independent language, which is suitable for implementing software agents. Besides, Java API includes a security framework, in which various aspects of common security techniques are defined. These security features are used to guarantee valuable data be encrypted when transmitted between different entities over network. Additionally, a 3 rd party security provider OpenJCE by an Australian corporation ABA [19] was also adopted. This provider has the necessary support for RSA public-key cryptography which is the main algorithm used in our implementation. 4.2 PROTOTYPE IMPLEMENTATION Agent Butler The implementation of the payment architecture began with the simulation of Agent Butler. Agent Butler is able to perform tasks in parallel with its mobile agents. It is 19

20 responsible for controlling agencies, tracking mobile agent actions, making final decisions. In addition, this stationary Agent Butler provides a GUI to accept data input and display instantaneously to the owner intermediate results of a specific task performed remotely. The modular structure of Agent Butler is depicted in Figure 8. Graphic User Interface Database Archive Agent Butler Agency Controller Information Agency Financing Agency Agent Communicator ButlerListener ButlerCommunicator Functional Modules Authentication Agent Dispatch Registration Purchase Figure 8. Modular Structure of Agent Butler As shown Figure 8, Agent Butler has two main function modules, agency controller and agent communicator. In addition, a database object is owned by Agent Butler and stores information including merchant host information, owner s preferences, etc. Such data may be passed to the related agency objects when needed. Agency controller is responsible for activating specific agency according to certain workflow. It is implemented as a member object within the class of Agent Butler. Agent communicator handles external socket communications with dispatched mobile agents. ButlerListener waits for messages from agents in remote hosts, while ButlerCommunicator is capable of 20

21 sending messages to these agents. Figure 9 shows the trace of the communication process between Agent Butler and a mobile agent to be dispatched. Figure 9. Sample Screenshot of Agent Dispatch and Communication Financing Agency Financing Agency is implemented as a composite class. It contains a payment manager object and an account manager object. Composition is a form of aggregation with strong ownership and coincident lifetime as part of the whole. Parts with non-fixed multiplicity may be created after the composite itself, but once created they live and die with it. The two managers are instantiated in the constructor of the Financing Agency class. Therefore, they can be accessed via certain access methods (e.g. getpaymentmanager()) provided by Financing Agency. These two managers are also composite classes, which consist of different agents corresponding to specific payment schemes. In this prototype implementation, two types of payment agents are implemented in Financing Agency. They are SETPaymentAgent and EcashPaymentAgent. SETPaymentAgent is implemented by following the SET protocol. EcashPaymentAgent pays by E-Cash, which is defined as shown in Figure 10. SerialNumber is simulated as a 21

22 randomly generated 50-digit numeric string. Value denotes the value that this E-Cash object represents. Signed denotes whether E-Cash has been certified by the bank server. Expiration Date denotes the expiration date of E-Cash. public class ECash extends Object { private String serialnumber; private double value; private boolean signed; private Date expirationdate; } Figure 10. Sample Code of E-Cash An electronic wallet class is implemented in a local environment, which could be used to manage, generate, and store e-cash. This e-wallet is controlled by E-Wallet Manager belonging to the accounting ASG (Figure 5). When the owner needs some cash, E-Wallet Manager will be activated by Account Manager to interact with the bank server. The screenshot of the e-wallet is shown in Figure 11. Figure 11. Sample Screenshot of the Electronic Wallet Uniform Payment Interface 22

23 As discussed in section 3.4 and 3.5, other payment schemes can be easily implemented and integrated into the architecture via a uniform payment interface - PaymentAgent. The following code in Figure 12 demonstrates how we define this interface. Payment Interface: public interface PaymentAgent { public PaymentInvoice proceedpayment (PurchaseInfo [] purchases, MerchantInfo merchant); } public class PaymentInvoice { private ItemInvoice[] iteminvoice; private double totalamount; } public class ItemInvoice { private String name; private double amount; private long purchasetimestamp; } public class PurchaseInfo { private String name; private int quantity; private double unitprice; } public class MerchantInfo { private hostname; private int portnumber; } Figure 12. Sample Code of the Uniform Payment Interface This sample code describes the interface that is implemented by each payment agent object. By defining an interface and forcing each payment agent to implement it, Payment Manager is able to invoke different payment agents in a uniform way. There are more than one payment agent embedded with specific payment mechanism logic in the system. Moreover, decision on which agent to complete the payment task is made during runtime by Payment Manager based on certain rules. Therefore, without defining an interface, Payment Manager has to know each agent to which it delegates the payment 23

24 task and which method of the chosen agent should be invoked. It makes the system hard to extend because adding a new agent requires adding the logic of invoking this agent in the Payment Manager class. Since payment agents that implement different payment schemes are invoked via this uniform payment interface, therefore the parameters of the interface methods must provide enough information to allow agents to carry out their payment schemes. To carry out a payment scheme, an agent needs to know what to buy as well as where to buy. As shown in Figure 12, the PurchaseInfo class contains information regarding what to buy and the MerchantInfo class contains information regarding where to buy. They are passed as arguments into the method proceedpayment(). The PaymentInvoice class returned by proceedpayment()contains the details of each item purchased. It is recorded and can be used by Auditing Manager for later usage. Payment Manager delegates the payment task by selecting a payment agent and then invokes the proceedpayment() method implemented by the payment agent Payment Configuration A configuration file is also needed to define which payment methods are available in the system. By editing the configuration file, a user is able to add or remove payment methods easily. The parameters defined in configuration file are listed in the following: NumberOfPaymentMethods: It indicates how many payment methods are defined in the configuration file. PaymentMethod(n)Name: It defines the name of the n-th payment method. The value is a string, which represents the payment method. 24

25 PaymentMethod(n)Impl: It defines the implementation of the n-th payment method. The value is a string, which denotes the class name of the payment method implementation. An object of this class is instantiated to execute the payment method. PaymentMethod(n)On: It flags whether this payment method is activated by the system. The value can be true or false. True means the system is able to activate this payment method. False means although the payment method is defined in the configuration file, the system has not activated it. The configuration file is read in during system startup. A GUI is provided to allow the user to select and activate a payment method. The name of each payment method defined in the configuration file (PaymentMethod(n)Name) will be shown on the display. Once the user selects a payment method, a payment object of its implementation class specified in the configuration file as PaymentMethod(n)Impl is created. Since all payment method classes implement the uniform payment interface, so a payment process can be activated by invoking the interface implemented by the corresponding payment object. We elaborate with a sample of the configuration file as shown in Figure 13. NumberOfPaymentMethods=2 PaymentMethod1Name=SET PaymentMethod1Impl=edu.nus.cnn.epayment.set.SETAgent PaymentMethod1On=true PaymentMethod2Name=ECash PaymentMethod2Impl=edu.nus.cnn.epayment.ecash.ECashAgent PaymentMethod2On=true Figure 13. Configuration File Sample 1 The sample in Figure 13 defines two payment methods. One is based on the SET protocol and the other is based on the E-Cash payment scheme. The class that provides 25

26 the implementation of the SET protocol is edu.nus.cnn.epayment.set.setpaymentagent. The class that provides the implementation of the E-Cash payment scheme is edu.nus.cnn.epayment.ecash.ecashpaymentagent. Accordingly, "SET" and "ECash" are loaded into the GUI selection list from which the user chooses a payment method. The user can either choose "SET" or "ECash" as the payment method. If the user chooses "SET", an object of class edu.nus.cnn.epayment.set.setpaymentagent is created. The implemented uniform payment interface is invoked on that SETPaymentAgent object, so that payment can be executed via the SET protocol. If the user chooses "ECash", an object of class edu.nus.cnn.epayment.set.ecashpaymentagent is created. The implemented uniform payment interface is invoked on that ECashPaymentAgent object and payment can be executed via the E-Cash payment scheme Automated Payment To automate the whole payment process, we have incorporated a rule-based decision capability into Payment Manager to automate the decision process of choosing a payment agent. A simple scheme is suggested in our architecture. A set of rules is defined in a rule-base for choosing a specific payment method under certain conditions. The template of a rule base is shown in Figure 14. NumberOfRules=n Rule(n)Priority = Rule(n)Factor = Rule(n)Condition = Rule(n)PaymentMethodName = Figure 14. Rule Base Template NumberOfRules specifies how many rules are defined in the rule base. In the template, each rule owns a unique ID, which is marked as (n) in the above figure. 26

27 Additionally, each rule has four attributes, namely Priority, Factor, Condition, and PaymentMethodName. The meaning of each will be clear after we go through the following example. Rule1Priority=1 Rule1Factor= cash-discount & transact-amount Rule1Condition= (credit-card-discount is true)&(transact-amount < 50) Rule1PaymentMethodName=ECash Rule2Priority=2 Rule2Factor= transact-amount Rule2Condition=transact-amount < 100 Rule2PaymentMethodName=SET Figure 15. Rule Base Sample We have incorporated a rule-based decision facility into Payment Manager to automate the decision process of choosing a payment agent. A simple scheme is included in our architecture. A set of rules is defined in a rule base for choosing a specific payment method under certain conditions. Each rule has one factor that specifies the selection condition with certain priority denotation. Rules are validated in the priority order. Once a rule is valid, the corresponding payment method is chosen. A sample rule base is shown in Figure 15. The rule base sample defines some rules of selecting a payment method. The first rule has the highest priority 1. The decision factor is cash discount and transaction amount. This rule is valid provided that there is a discount offer for a cash payment and the transaction amount is less than $50. The second rule has a lower priority 2. The decision factor is transaction amount. This rule is valid provided that the transaction amount is less than $100. Payment Manager evaluates all the rules defined in the rule 27

28 base in the priority order. Payment Manager checks whether the condition of the first rule is met. If met, Payment Manager selects ECash as the payment method. Otherwise, Payment Manager continues to evaluate the next rule. If all rules are invalid, Payment Manager can report to the owner and wait for his decision. 4.3 EVALUATION AND DISCUSSIONS Flexibility The rationale of designing a multi-agent electronic payment architecture is to provide a framework, which can accommodate different types of payment methods. The prototype is built to illustrate this rationale. The purpose of this prototype is not to build a full-fledged e-payment system, rather it builds a foundation to allow a full functional e- payment system to be built incrementally on top of it. Therefore the focus of the prototype is to define a uniform payment interface, build two types of e-payment agents (i.e. SET and E-Cash) and incorporate the encryption/decryption capability to guarantee a secure transaction. NumberOfPaymentMethods=3 PaymentMethod1Name=SET PaymentMethod1Impl=edu.nus.cnn.epayment.set.SETAgent PaymentMethod1On=true PaymentMethod2Name=ECash PaymentMethod2Impl=edu.nus.cnn.epayment.ecash.ECashAgent PaymentMethod2On=true PaymentMethod3Name=ECheck PaymentMethod3Impl=edu.nus.cnn.epayment.echeck.ECheckPaymentAgent PaymentMethod3On=true Figure 16. Configuration File Sample 2 In the following, we demonstrate how a new payment method can be plugged into the system easily. For instance, another payment method ECheck is implemented by the 28

29 class edu.nus.cnn.epayment.echeck.echeckpaymentagent. To add it into the system, we only need to change the configuration file as shown in Figure 16. After the system is restarted, the new configuration file is read. Then, the additional payment method ECheck is available from the GUI selection list. If the user chooses ECheck, an object of class edu.nus.cnn.epayment.set.echeckpaymentagent is created. The uniform payment interface implemented by ECheckPaymentAgent is invoked and payment can be executed via the ECheck payment scheme. To remove or disable a payment method, the user can either remove the entry from the configuration file or simply turn that payment method off by setting "PaymentMethod(n)On=false" Security Security is one of the most important issues in electronic payment transactions, e.g. secure data transmission. In mobile agent computing, the security issues also include the security of mobile agents against dishonest shopping servers and the security of shopping servers against malicious agents. First of all, each entity has to register with Certificate Authority for a set of personal certificates, which are used to enable secure data transmission and to authenticate its identity before any interaction may happen. When mobile agents are sent out to a remote merchant host to collect useful product information, the host always requires adequate authentication proof before accepting further interaction with an agent. Agent Butler is regarded as the owner s legal representative and provided with the owner s certificate and a signature on the Agent Butler s public key and identification number. Before a mobile agent is sent out, Agent Butler sends its authentication proof to 29

30 the host and requests for a permission token which will be used later as part of the mobile agent s identity validation. Therefore, the host will only accommodate mobile agents from users it trusts. On the other hand, since Agent Butler is a static user agent staying on the owner s host, thus its integrity is guaranteed. Before sending out a mobile agent, Agent Butler also needs to check the authenticity of a merchant host by requesting for its certificate. In our system, mobile agents are not embedded with payment functionalities, therefore they do not carry sensitive information such as payment information when roaming on the Internet. This would decrease the possibility of its being attacked by malicious hosts. However, the product information gathered from previous merchant hosts may be a target of malicious hosts, therefore, there should be some measure to protect and verify the integrity of mobile agents. Since it is not the focus of this paper, we won t discuss this issue in details. Related research work has been carried out by the SAFER research group [14, 20]. When e-payment transactions are in progress, in order to ensure the integrity of various messages sent and received during an e-cash or SET transaction, all messages are digitally signed with the originating entity s private key. The receiving entity would be able to use the sender s public key from its key-exchange certificate to verify that the message has not been tampered with as well as authenticate the identity of the sending party. To protect the information in the messages from being exposed to unauthorized parties, the message contents are also encrypted whenever possible using a combination of both symmetric and public-key encryption techniques Performance Analysis 30

31 The objective of the performance testing is to measure how long it takes to complete a payment transaction and to analyze the system performance. We benchmarked the two types of payment methods implemented in our system: SET-based credit-card payment and E-cash payment. Credit-card based payment performance result The average performance result shown in Table 1 was concluded from more than 10 tests. The average period of time that one credit-card payment transaction takes is 1300 milliseconds. Each credit-card payment transaction consists of four main steps which were also benchmarked in Table 1. Table 1 Credit-card Transaction Average Performance Result Total Transaction time (ms) Transaction Initiation (ms) Merchant Certificate (ms) Data Encryption (ms) Payment Confirmation (ms) E-cash payment performance result As shown in Table 2, the average time of an E-cash payment transaction is 630 milliseconds. Each E-cash payment transaction consists of several main steps which were also benchmarked in Table 2. Table 2 E-cash Transaction Performance Breakdown Total Transaction time (ms) Transaction Initiation (ms) Merchant Certificate (ms) E-cash Withdraw (ms) Data Encryption (ms) Payment Confirmation (ms) Based on the testing results discussed above, we compare the performance of the two payment methods. We notice that the SET protocol based credit card payment takes longer processing time than E-cash payment. Specifically, we find out that the difference 31

32 mostly exists in the last step, payment confirmation, where the real payment transaction happens at the Merchant side. It takes 1070 milliseconds to finish the step for credit card payment method and 390 milliseconds for E-cash payment method. However, this difference is reasonable and also expectable in our design. Most of the time costs are spent on message exchanges among different entities as well as the encryption/decryption processing. The SET protocol aims to provide more secure guarantee for e-payment by separating the communication only to related parties in certain steps of the payment process and encrypting all the messages exchanged. In the last step, the Owner, Merchant Host, Payment Gateway (PG) and Certificate Authority (CA) are all involved in message exchanges. In addition, PG and CA are requested to validate the Owner s payment information (related to the Owner s account) before the Merchant can send out payment confirmation to the SET payment agent. The whole process is time consuming. In comparison, E-cash payment is simpler. When the Merchant receives the E-cash notes, it only needs to contact the E-cash bank server to deposit the E-cash. The bank server will validate E-cash. If all the E-cash notes are valid, the bank will send a deposit confirmation to the Merchant who will send out the payment confirmation to the E-cash payment agent. E-cash payment is more efficient than SETbased credit card payment. However, the E-cash bank server needs to validate the E-cash notes one by one. When there is a large amount of E-cash being used, the processing time for E-cash payment will increase accordingly. Therefore, from these facts and analysis, we highly recommend using E-cash payment in small-amount transactions for efficiency and cost saving concern, and using SET-based credit card payment in large-amount transactions. 32

33 4.3.4 Discussions Agent Butler represents its owner and is responsible for agent management and manipulation. When the owner wants to buy some products from some merchant hosts within the SAFER community, he authorizes his Agent Butler to dispatch mobile agents to collect useful information on his behalf. This is done as follows. Firstly, the owner issues Agent Butler a set of encryption keys (SK Ao, PK Ao ). Then, the owner authorizes Agent Butler as his legal representative by providing it with his digital certificate (registered with CA) and signing the ID of Agent Butler. In addition, the owner also provides his shopping requirements and a list of trusted merchant hosts URLs to Agent Butler. Mobile agents in this prototype do not have the functionality or authority to carry out electronic payment transactions on its own. At this stage, it is still difficult to safeguard agents dispatched to external entities. Vital payment information is thus retained in Agent Butler where it can be easily secured. Transactions are tightly controlled by Agent Butler via its Financing Agency. In the future, when a certain level of integrity and secrecy can be achieved for mobile agents, payment functions could then be incorporated into them. Compatibility issues arise when integrating different agents into e-commerce websites for transactions. It is suggested that the use of an agent based virtual marketplace could be a stopgap solution before certain protocol standards could be imposed. Virtual marketplace, also under research, considered to be an integral part of SAFER application would also bring with it enhanced security features. Recent work on Semantic Web [8] may offer a long-term solution. 33

A Modularized Electronic Payment System for Agent-based E-commerce

A Modularized Electronic Payment System for Agent-based E-commerce A Modularized Electronic Payment System for Agent-based E-commerce Sheng-Uei Guan 1, Sin Lip Tan, Feng Hua Department of Electrical & Computer Engineering National University of Singapore 10 Kent Ridge

More information

A Modularized Electronic Payment System for Agent-based E-commerce Sheng-Uei Guan, Sin Lip Tan and Feng Hua

A Modularized Electronic Payment System for Agent-based E-commerce Sheng-Uei Guan, Sin Lip Tan and Feng Hua A Modularized Electronic Payment System for Agent-based E-commerce Sheng-Uei Guan, Sin Lip Tan and Feng Hua Department of Electrical & Computer Engineering National University of Singapore 10 Kent Ridge

More information

Electronic Cash Payment Protocols and Systems

Electronic Cash Payment Protocols and Systems Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas

More information

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and

More information

Chapter 10. e-payments

Chapter 10. e-payments Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

Account-Based Electronic Payment Systems

Account-Based Electronic Payment Systems Account-Based Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry Sept., 2000 Topic: Account-Based Electronic

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Electronic Payment Systems. Dr Sherif Kamel

Electronic Payment Systems. Dr Sherif Kamel Electronic Payment Systems Dr Sherif Kamel Payment Evolution Important Factors Interoperability and portability Security Ease of use Transaction fees Regulations and procedures Acceptability and trust

More information

The e-payment Systems

The e-payment Systems The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic

More information

Electronic payment systems

Electronic payment systems Electronic payment systems overview of basic concepts credit-card based systems (MOTO, SSL, SET) electronic cash systems (DigiCash) micropayment schemes (PayWord, probabilistic schemes) brief history of

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

Design and Implementation of RMP - A Virtual Electronic Market Place

Design and Implementation of RMP - A Virtual Electronic Market Place Design and Implementation of RMP - A Virtual Electronic Market Place 1 Introduction Susanne Boll*, Wolfgang Klas*, Bernard Battaglin** Electronic commerce is one of the currently most exciting and fast

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Mobile Electronic Payments

Mobile Electronic Payments Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to

More information

Credit card: permits consumers to purchase items while deferring payment

Credit card: permits consumers to purchase items while deferring payment General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material

More information

Analysis of E-Commerce Security Protocols SSL and SET

Analysis of E-Commerce Security Protocols SSL and SET Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce

More information

Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia

Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia Miscellaneous Publication Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia SAA MP75 1996 STRATEGIES FOR THE IMPLEMENTATION OF A PUBLIC KEY AUTHENTICATION FRAMEWORK

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Interoperable Mobile Payment A Requirements-Based Architecture

Interoperable Mobile Payment A Requirements-Based Architecture Interoperable Mobile Payment A Requirements-Based Architecture Dr. Manfred Männle Encorus Technologies GmbH; product management Payment Platform Summary: Existing payment methods like cash and debit/credit

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

A Scheme for Analyzing Electronic Payment Systems

A Scheme for Analyzing Electronic Payment Systems A Scheme for Analyzing Electronic Payment Systems Lucas de Carvalho Ferreira IC/Unicamp and DEX/UFLA DEX, Campus da UFLA 37200-000 Lavras MG Brasil lucasf@ufla.br Ricardo Dahab IC/Unicamp Caixa Postal

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

W2B Payments Complete solution for Cash Acceptance Network

W2B Payments Complete solution for Cash Acceptance Network WEB TO BUSSINESS Ltd #304, John Humphries House, 4-10 Stockwell Street, Greenwich, London, United Kingdom, SE10 9JN W2B Payments Complete solution for Cash Acceptance Network The cash is not yet dominant

More information

The Definition of Electronic Payment

The Definition of Electronic Payment Part IX: epayment Learning Targets What are the electronic means of payment? What is the difference between pico-, micro- and macro-payment? How can we classify the e-payment systems? How can secure transactions

More information

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

CHAPTER THREE, Network Services Management Framework

CHAPTER THREE, Network Services Management Framework CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7

More information

Electronic Payments. EITN40 - Advanced Web Security

Electronic Payments. EITN40 - Advanced Web Security Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

On-line Payment and Security of E-commerce

On-line Payment and Security of E-commerce ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Setting Up an AS4 System

Setting Up an AS4 System INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu, www.entsog.eu,

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

How much do you pay for your PKI solution?

How much do you pay for your PKI solution? Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Swedbank Payment Portal Implementation Overview

Swedbank Payment Portal Implementation Overview Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: abhayu@rediffmail.com

More information

Authentication Application

Authentication Application Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be

More information

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Using EMV Cards to Protect E-commerce Transactions

Using EMV Cards to Protect E-commerce Transactions Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

How Online Payments Really Work

How Online Payments Really Work Insights for Businesses How Online Payments Really Work If you re thinking about setting up an online store, you re in good company. Shoppers are increasingly turning to online options, as their access

More information

BUSINESS GUIDE. Online Payment Processing. What You Need to Know

BUSINESS GUIDE. Online Payment Processing. What You Need to Know Online Payment Processing What You Need to Know CONTENTS + Introduction 3 + Online Payment Processing Basics 4 + The Payment Processing Network 4 + How Payment Processing Works 5 + What You Should Know

More information

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

Understanding Digital Signature And Public Key Infrastructure

Understanding Digital Signature And Public Key Infrastructure Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where

More information

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

How To Pay With Cash Or Credit Card (For Women)

How To Pay With Cash Or Credit Card (For Women) Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry Sept, 2000 Topic: Online Payment Protocols and Systems

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

The Security Framework 4.1 Programming and Design

The Security Framework 4.1 Programming and Design Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: info@setecs.com Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO

More information

A Digital Signature Scheme in Web-based Negotiation Support System

A Digital Signature Scheme in Web-based Negotiation Support System A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada yxmeng68@yahoo.ca

More information

Part I System Design Considerations

Part I System Design Considerations as of December 10, 1998 Page 1 Overview Part I System Design Considerations Introduction Part I summarizes system design considerations to be used in developing SET toolkits and applications. It provides

More information

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,

More information

Electronic Payment Systems. Traditional Methods

Electronic Payment Systems. Traditional Methods Electronic Payment Systems Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Traditional Methods Traditional

More information

SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS

SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu

More information

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals

More information

University Policy Accepting Credit Cards to Conduct University Business

University Policy Accepting Credit Cards to Conduct University Business BROWN UNIVERSITY University Policy Accepting Credit Cards to Conduct University Business Purpose Brown University requires all departments that are involved with credit card handling to do so in compliance

More information

Electronic Payment Systems on Open Computer Networks: A Survey

Electronic Payment Systems on Open Computer Networks: A Survey Electronic Payment Systems on Open Computer Networks: A Survey Working paper Thomi Pilioura Abstract The extraordinary growth of international interconnected computer networks and the pervasive trend of

More information

Innovations in Digital Signature. Rethinking Digital Signatures

Innovations in Digital Signature. Rethinking Digital Signatures Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance

More information

OnSite 7.0 Setting Up A Merchant Account

OnSite 7.0 Setting Up A Merchant Account OnSite 7.0 Setting Up A Merchant Account ShopWorks 1655 Palm Beach Lakes Blvd. Ste 640 West Palm Beach, FL 33401 Ph: 561-491-6000 Fx: 561-491-6001 Rev. 01 Last Updated: 3/12/09 Table of Contents Introduction...

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Internet Usage (as of November 1, 2011)

Internet Usage (as of November 1, 2011) ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%

More information

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file 1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

An access number, dialed by a modem, that lets a computer communicate with an Internet Service Provider (ISP) or some other service provider.

An access number, dialed by a modem, that lets a computer communicate with an Internet Service Provider (ISP) or some other service provider. TERM DEFINITION Access Number Account Number Acquirer Acquiring Bank Acquiring Processor Address Verification Service (AVS) Association Authorization Authorization Center Authorization Fee Automated Clearing

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

QuickPay: Protocol for Online Payment Graduate Project for CS 298

QuickPay: Protocol for Online Payment Graduate Project for CS 298 QuickPay: Protocol for Online Payment Graduate Project for CS 298 Submitted by Jian Dai Advised by Dr. Mark Stamp Reviewed By: Dr. Chris Pollett Reviewed By: Dr. David Blockus May 9, 2006 1 ABSTRACT Even

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

How To Change A Bank Card To A Debit Card

How To Change A Bank Card To A Debit Card The Evolution of EFT Networks from ATMs to New On-Line Debit Payment Products * Stan Sienkiewicz April 2002 Summary: On June 15, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia

More information

Orbiter Series Service Oriented Architecture Applications

Orbiter Series Service Oriented Architecture Applications Workshop on Science Agency Uses of Clouds and Grids Orbiter Series Service Oriented Architecture Applications Orbiter Project Overview Mark L. Green mlgreen@txcorp.com Tech-X Corporation, Buffalo Office

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Guideline on Debit or Credit Cards Usage

Guideline on Debit or Credit Cards Usage CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

What is an SSL Certificate?

What is an SSL Certificate? Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert

More information

CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems

CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems CHAPTER 6 E-commerce Payment Created by, David Zolzer, Northwestern State University Louisiana Copyright 2002 Pearson Education, Inc. Slide 6-1 Copyright 2002 Pearson Education, Inc. Slide 6-2 Learning

More information

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59

CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59 CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59 Albert Levi Information Security Lab Electrical and Computer Engineering Dept. Oregon State University, Corvallis, Oregon 97331

More information

Lecture VII : Public Key Infrastructure (PKI)

Lecture VII : Public Key Infrastructure (PKI) Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public

More information